WO2004081767A1 - Method and system for enabling remote message composition - Google Patents
Method and system for enabling remote message composition Download PDFInfo
- Publication number
- WO2004081767A1 WO2004081767A1 PCT/IB2004/050170 IB2004050170W WO2004081767A1 WO 2004081767 A1 WO2004081767 A1 WO 2004081767A1 IB 2004050170 W IB2004050170 W IB 2004050170W WO 2004081767 A1 WO2004081767 A1 WO 2004081767A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- sequence
- message
- symbols
- remote terminal
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
- G09C1/02—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system by using a ciphering code in chart form
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Definitions
- the invention relates to a method of enabling composition of a message at a remote terminal, comprising generating an image comprising a plurality of symbols representing input means, transmitting the image for display on the remote terminal, receiving a sequence of coordinates from the remote terminal, and reconstructing the message as a sequence of input means represented by the symbols comprised in the image at the received coordinates.
- the invention further relates to a server and to a computer program product.
- US-B-6209102 discloses a way to allow composition of a message through visually rendered input means on a display of a remote terminal.
- a server generates an image so that it represents a plurality of input means such as keys on a keyboard.
- Each input means represents an element that can be used in the message that will be composed by the user.
- the user then composes the message he wants to return by selecting the input means rendered as an image on the display. Selecting the input means is done by selecting a particular set of coordinates on the display of the terminal.
- the set of coordinates is then transmitted back to the server.
- the server When the server receives the set of coordinates, it translates it to a particular input means represented on the image.
- the message composed by the user is constructed as the elements represented by the particular input means to which the sets of coordinates were translated.
- a problem with the system described above is that the server can not be sure that a response is really originating from the intended user.
- An adversary might for example randomly choose some random positions and send them back to the server.
- the server cannot distinguish such a response from invalid response by the intended honest user. In other words, there is no message authentication from terminal to server.
- This object is achieved according to the invention in a method comprising generating an image comprising a plurality of symbols representing input means, the symbols having an associated particular visual characteristic which is mutually different for at least two of the symbols, transmitting the image for display on the remote terminal, receiving a sequence of coordinates from the remote terminal, reconstructing the message as a sequence of input means represented by the symbols comprised in the image at the received coordinates, constructing an authentication code as a sequence of visual characteristics associated with the symbols comprised in the image at the received coordinates, and accepting the message as authentic if the authentication code matches a predetermined sequence of visual characteristics.
- the visual characteristic comprises the color or visual shape of the input means.
- the image transmitted to the terminal now contains, for example, two sets of alphanumeric characters, the characters in the first set being in a first color and the characters in the second set being in a second color.
- the user can then compose his message by first picking a character from the first set and then picking a character from the second set. If an adversary subsequently reverses the order of the coordinates, the server can detect this tampering because the colors associated with the characters are in the wrong order.
- the predetermined sequence is associated with a particular user of the remote terminal. The predetermined sequence of visual characteristics then serves as evidence that the message was indeed composed by that particular user.
- a different, preferably randomly chosen, predetermined sequence could be used for every image, in which case the sequence should be indicated in the image.
- an alarm is raised if the authentication code matches the predetermined sequence. This way a user operating under duress from an adversary can secretly raise the alarm. The message should still be accepted as authentic so the adversary won't notice the alarm has been raised.
- the user may be assigned two predetermined sequences, one for 'normal' operation and one for operation under duress.
- an XOR operation is applied to the image using a key sequence associated with the user and the result of that operation is transmitted for display on the remote terminal.
- This enables the use of visual cryptography to securely send the image from the server to the terminal over an untrusted network.
- the result of the XOR operation can be displayed on an untrusted terminal as-is.
- the user superimposes a trusted decryption device on the terminal and thereby visually reconstructs the image.
- Visual cryptography and its application of enabling secure composition of messages is discussed in European patent application 02075527.8 (PHNL020121) and European patent application 02078660.4 (PHNL020804). In this setting it is preferred to use a new randomly chosen predetermined sequence in every image. This sequence must then be indicated in the transmitted image in some way (e.g. by indicating a sequence of colors that corresponds to the colors of the input means).
- Fig. 1 schematically shows a system comprising a server and several terminals
- Figs. 2A, 2B, 2C show example images that can be generated by the server; Figs. 3A, 3B, 3C schematically illustrate an embodiment of the system using visual cryptography.
- Fig. 1 schematically shows a system according to the invention, comprising a server 100 and several terminals 101, 102, 103.
- the terminals 101-103 are embodied here as a laptop computer 101, a palmtop computer 102 and a mobile phone 103, they can in fact be realized as any kind of device, as long as the device is able to interactively communicate with the server 100 and is able to render graphical images on a display.
- the communication can take place over a wire, such as is the case with the laptop 101, or wirelessly like with the palmtop computer 102 and the mobile phone 103.
- a network such as the Internet or a phone network could interconnect the server 100 and any of the terminals 101-103.
- the server 100 generates an image representing a message that needs to be communicated to a user of the terminal 101.
- the image represents a plurality of input means such as keys on a keyboard.
- Such keys could be visually rendered as keys representing different alphanumerical characters, or as buttons representing choices like 'Yes', 'No', 'More information' and so on.
- Each input means represents an element that can be used in the message that will be composed by the user.
- the input means could also be checkboxes, selection lists, sliders or other elements typically used in user interfaces to facilitate user input. Other ways to visually represent input means are well known in the art. It is observed that different input means may, but need not necessarily, represent different symbols.
- symbol can mean single alphanumerical characters, but also texts like 'Yes', 'No' and so on, as well as other linguistic or symbolic elements.
- Figs. 2A, 2B and 2C Some example images are shown in Figs. 2A, 2B and 2C.
- the symbols all have an associated particular visual characteristic which is mutually different for at least two of the symbols.
- the visual characteristic comprises the color or visual shape of the input means.
- the symbols are grouped in three groups, the symbols of one group sharing a visual characteristic and the visual characteristics of different groups being different.
- the groups have different background patterns.
- the groups have mutually different shapes.
- Fig. 2C the groups have different colors (grayscale values).
- the symbols representing the input means are now also distributed in a (pseudo-)random fashion over the image.
- Fig. 2C there is also an indication 201 of the order in which the input means should be selected.
- the server 100 transmits the generated image to the terminal 101 for display thereon. The user then composes the message he wishes to transmit to the server 100 by selecting keys or other input means rendered as an image on the display.
- Selecting the input means is done by selecting a particular set of coordinates on the display of the terminal 101.
- the user inputs the set of coordinates by applying pressure to a particular spot of the display, the set of coordinates corresponding to the particular spot.
- the display equipped with a touch-sensitive screen, can then register the spot to which pressure was applied, and translate this to a set of coordinates.
- other input devices such as a mouse, a graphics tablet or even a keyboard can also be used.
- the set of coordinates is then transmitted back to the server 100.
- the server 100 receives the set of coordinates, it translates it to a particular input means represented on the image.
- the message composed by the user is constructed as the elements represented by the particular input means to which the sets of coordinates were translated. For example, using the image of Fig. 2C, the outcome could be 7-3-1 or 4-9-1. Random coordinates generated by an adversary will generally not correspond to input means, and so such a message can be distinguished easily from valid messages.
- the server 100 next constructs an authentication code.
- the server 100 now constructs a sequence of visual characteristics associated with the symbols comprised in the original image at the received coordinates. For example, using the image of Fig. 2C, the outcome could be black-gray-white or gray-gray-white. In the case of Fig. 2B, the outcome could be square-circle-trapezoid.
- the server 100 accepts the message as authentic if the authentication code matches a predetermined sequence of visual characteristics.
- the predetermined sequence can be unique to the image, as is the case in Fig. 2G > where indication 201 serves to inform the user that he must compose his message by first using a black input symbol, then a grayscale symbol and finally a white symbol.
- the outcome 7-3-1 would now be accepted as authentic only if the black '7' symbol, the gray '3' symbol and the white ' 1 ' symbol were selected by the user in that order.
- the predeterm ⁇ :ned sequence can be associated with the user.
- the server 100 could maintain a 11st of users and sequences they are supposed to use.
- One user might be assigned "square-c i:ircle-trapezoid" and another one "circle-trapezoid- square". Both users could use the image of Fig. 2b.
- One user could also be assigned two predetermined sequences, one of which is supposed to be used only when the user is operating the terminal 101 under duress. In that case, the server 100 can trigger an alarm (not shown). Both sequences are accepted as authentic, to prevent an adversary from learning the alarm has been raised.
- the server 100 encodes the image as a sequence of information units based on visual cryptography. This is preferably done by applying an XOR operation to every pixel in the image using a key sequence associated with the user of the terminal 101. The result is transmitted to the terminal 101 instead of the image itself.
- Visual cryptography and its application of enabling secure composition of messages is discussed in European patent application 02075527.8 (PHNL020121) and European patent application 02078660.4 (PHNL020804). These applications discuss visual cryptography using liquid crystal displays (LCDs) to display the encoded image and the key sequence.
- LCDs liquid crystal displays
- 'Classical' visual cryptography uses transparent sheets and requires mapping every pixel to a block of pixels, preferably 2x2 or 2x1 pixels, when encoding it. This is also discussed in the two aforementioned European patent applications.
- Using visual cryptography means that it is no longer necessary to protect the transmission by e.g. encrypting the encoded sequence or setting up a secure authenticated channel, before transmitting it. Assuming the key sequence is not available and chosen carefully, it is impossible for an eavesdropper to recover the image by using only the encoded sequence. Decryption of the visually encoded image will now be discussed in more detail. Also shown in Fig. 1 is a personal decryption device 110.
- This device 110 is personal to a user and should be guarded well, as it is to be used to decrypt visually encoded messages sent by the server 100 to any of the terminals 101-103.
- Anyone who gains physical control over the decryption device 110 can read all visually encrypted messages intended for the user.
- entering a password or Personal Identification Number (PIN) could be required upon activation of the decryption device 110.
- the device 110 could also be provided with a fingerprint reader, or be equipped to recognize a voice command uttered by its rightful owner.
- the decryption device 110 comprises a display 111 and a storage area 112.
- the display 111 is preferably realized as an LCD screen. Although normally such a display 111 would have a polarization filter on both sides of the liquid crystal layer, in this embodiment the display 111 only has one polarization filter.
- the LCD screen of the terminal 101 that receives the visually encrypted message should then have a portion of the topmost polarization filter removed. This portion should be large enough to allow the display 111 to be superimposed upon it.
- the LCD screen of the terminal 101 can be provided with a (preferably small) separate display on which the display 111 is to be superimposed.
- the display 111 has no polarization filter.
- the storage area 112 comprises the key sequence to be used in decrypting visually encrypted images. Elements of the key sequence represent arbitrary rotations of the polarization of cells in the display 111.
- the terminal 101 When the terminal 101 receives the encoded sequence, it displays the elements of the sequence as respective pixels on a portion of an LCD screen 301, as illustrated in Fig. 3 A.
- the encoded sequence is displayed by rotating the polarization of respective cells in the liquid crystal layer in the display 301 by an amount indicated by respective elements in the encoded sequence.
- the user superimposes the personal decryption device 110 upon the pixels displayed on display 301. Because both the decryption device 110 and the terminal 101 each effectively display one share of a visually encrypted image, the user can now observe the reconstructed image.
- the reconstructed message is the textual message "A! in black lettering with a grayscale bar below.
- the image can also be encrypted using conventional secret key and/or public key encryption algorithms. It can be sent unencrypted over a secure channel, i.e. one that an attacker cannot tap into.
- the invention can be used in any kind of system in which a secure communication from a server to a terminal and/or vice versa is necessary.
- the remote terminals 101-105 can be embodied as personal computers, laptops, mobile phones, palmtop computers, automated teller machines, public Internet access terminals and so on.
- any reference signs placed between parentheses shall not be construed as limiting the claim.
- the word “comprising” does not exclude the presence of elements or steps other than those listed in a claim.
- the word "a” or “an” preceding an element does not exclude the presence of a plurality of such elements.
- the invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the device claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/548,251 US20060098841A1 (en) | 2003-03-11 | 2004-03-01 | Method and system for enabling remote message composition |
JP2006506655A JP2006520047A (en) | 2003-03-11 | 2004-03-01 | Method and system for enabling remote message creation |
EP04715983A EP1604258A1 (en) | 2003-03-11 | 2004-03-01 | Method and system for enabling remote message composition |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP03100606.7 | 2003-03-11 | ||
EP03100606 | 2003-03-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004081767A1 true WO2004081767A1 (en) | 2004-09-23 |
Family
ID=32981908
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2004/050170 WO2004081767A1 (en) | 2003-03-11 | 2004-03-01 | Method and system for enabling remote message composition |
Country Status (6)
Country | Link |
---|---|
US (1) | US20060098841A1 (en) |
EP (1) | EP1604258A1 (en) |
JP (1) | JP2006520047A (en) |
KR (1) | KR20050117552A (en) |
CN (1) | CN1759364A (en) |
WO (1) | WO2004081767A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7073067B2 (en) * | 2003-05-07 | 2006-07-04 | Authernative, Inc. | Authentication system and method based upon random partial digitized path recognition |
JP2006243938A (en) * | 2005-03-01 | 2006-09-14 | Oki Electric Ind Co Ltd | Password input device |
WO2008124659A1 (en) * | 2007-04-05 | 2008-10-16 | Dynamic Representation Systems, Llc., Part Ii | Methods and systems for generating a symbol identification challenge |
WO2009000223A2 (en) * | 2007-06-27 | 2008-12-31 | Universität Tübingen | Device and method for tap-proof and manipulation-proof encoding of online accounts |
FR2919742A1 (en) * | 2007-08-01 | 2009-02-06 | Phoum Lib | Transaction securing method for mobile terminal, involves relating transmitter with receiver, and loading connection to certify actions of user by generating ad hoc safety tests under form of non interpretable images by machine |
US7849321B2 (en) | 2006-08-23 | 2010-12-07 | Authernative, Inc. | Authentication method of random partial digitized path recognition with a challenge built into the path |
EP2514135A1 (en) * | 2009-12-14 | 2012-10-24 | Telcordia Technologies, Inc. | Systems and methods for authenticating a server by combining image recognition with codes |
EP2682891A1 (en) * | 2012-07-06 | 2014-01-08 | Samsung Electronics Co., Ltd | Electronic Device and Method for Releasing Lock Using Element Combining Color and Symbol |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100844195B1 (en) * | 2007-02-28 | 2008-07-04 | (주)민인포 | A user authentication method of having used graphic OTP |
DE102007018802B3 (en) * | 2007-04-20 | 2008-08-28 | Universität Tübingen | Method for tap-proof transmission of character string from client to server through computer network, involves producing shadow image on screen through server according to visual cryptography process |
DE102007043843A1 (en) | 2007-07-21 | 2009-01-22 | Borchert, Bernd, Dr. | Character string tap-proof transmitting method for e.g. on-line bank account, involves providing information with image to position client, and inputting reconstruction of character string by client using server |
GB2457733A (en) * | 2008-02-25 | 2009-08-26 | Mobank Ltd | Securing inputting of sensitive information |
US20100024018A1 (en) * | 2008-07-22 | 2010-01-28 | Jason David Koziol | Keyboard Display Posing An Identification Challenge For An Automated Agent |
US20100046790A1 (en) * | 2008-08-22 | 2010-02-25 | Koziol Anthony R | Method and system for generating a symbol identification challenge |
SE534758C2 (en) * | 2008-09-15 | 2011-12-13 | Security Alliance Stockholm Ab | Method with predetermined terms for secure electronic communication |
DE102009035005A1 (en) * | 2009-07-28 | 2011-02-03 | Giesecke & Devrient Gmbh | Method for transferring transaction data from e.g. personal computer to transaction device at bank, involves decoding transmitted transaction data according to decoding process by transaction device |
JP5659284B1 (en) * | 2013-11-27 | 2015-01-28 | 株式会社三菱東京Ufj銀行 | Program, server and communication terminal |
JP6005890B1 (en) * | 2014-05-01 | 2016-10-12 | バンクガード株式会社 | Server system, communication system, communication terminal device, program, and communication method |
JP2016015107A (en) | 2014-05-01 | 2016-01-28 | バンクガード株式会社 | Server system, communication system, communication terminal device, program, recording medium, and communication method |
DE102014225002A1 (en) * | 2014-12-05 | 2016-06-09 | Universität Rostock | Method and device for decryption and encryption |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5341425A (en) * | 1992-12-02 | 1994-08-23 | Scientific Atlanta, Inc. | Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site |
US5428349A (en) * | 1992-10-01 | 1995-06-27 | Baker; Daniel G. | Nondisclosing password entry system |
DE19620346A1 (en) * | 1996-05-21 | 1997-11-27 | Bosch Gmbh Robert | Graphical password log-in procedure for user of data terminal in computer system |
US5821933A (en) * | 1995-09-14 | 1998-10-13 | International Business Machines Corporation | Visual access to restricted functions represented on a graphical user interface |
EP0902352A2 (en) * | 1997-09-10 | 1999-03-17 | Fujitsu Limited | Authentication apparatus, user authentication method, user authentication card and storage medium |
EP1139649A2 (en) * | 2000-03-28 | 2001-10-04 | Eastman Kodak Company | Method and system for locating and accessing digitally stored images |
US20020029341A1 (en) * | 1999-02-11 | 2002-03-07 | Ari Juels | Robust visual passwords |
FR2819323A1 (en) * | 2001-01-05 | 2002-07-12 | Schlumberger Systems & Service | METHOD FOR ACCESSING A SECURE SYSTEM |
US20020188872A1 (en) * | 2001-06-06 | 2002-12-12 | Willeby Tandy G. | Secure key entry using a graphical user inerface |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5550649A (en) * | 1992-05-14 | 1996-08-27 | Current Logic Systems, Inc. | Multi-function telecommunications instrument |
GB9416595D0 (en) * | 1994-08-17 | 1994-10-12 | British Telecomm | User authentication in a communications network |
US6209102B1 (en) * | 1999-02-12 | 2001-03-27 | Arcot Systems, Inc. | Method and apparatus for secure entry of access codes in a computer environment |
-
2004
- 2004-03-01 CN CNA2004800064440A patent/CN1759364A/en active Pending
- 2004-03-01 KR KR1020057016907A patent/KR20050117552A/en not_active Application Discontinuation
- 2004-03-01 US US10/548,251 patent/US20060098841A1/en not_active Abandoned
- 2004-03-01 WO PCT/IB2004/050170 patent/WO2004081767A1/en not_active Application Discontinuation
- 2004-03-01 JP JP2006506655A patent/JP2006520047A/en active Pending
- 2004-03-01 EP EP04715983A patent/EP1604258A1/en not_active Withdrawn
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5428349A (en) * | 1992-10-01 | 1995-06-27 | Baker; Daniel G. | Nondisclosing password entry system |
US5341425A (en) * | 1992-12-02 | 1994-08-23 | Scientific Atlanta, Inc. | Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site |
US5821933A (en) * | 1995-09-14 | 1998-10-13 | International Business Machines Corporation | Visual access to restricted functions represented on a graphical user interface |
DE19620346A1 (en) * | 1996-05-21 | 1997-11-27 | Bosch Gmbh Robert | Graphical password log-in procedure for user of data terminal in computer system |
EP0902352A2 (en) * | 1997-09-10 | 1999-03-17 | Fujitsu Limited | Authentication apparatus, user authentication method, user authentication card and storage medium |
US20020029341A1 (en) * | 1999-02-11 | 2002-03-07 | Ari Juels | Robust visual passwords |
EP1139649A2 (en) * | 2000-03-28 | 2001-10-04 | Eastman Kodak Company | Method and system for locating and accessing digitally stored images |
FR2819323A1 (en) * | 2001-01-05 | 2002-07-12 | Schlumberger Systems & Service | METHOD FOR ACCESSING A SECURE SYSTEM |
US20020188872A1 (en) * | 2001-06-06 | 2002-12-12 | Willeby Tandy G. | Secure key entry using a graphical user inerface |
Non-Patent Citations (1)
Title |
---|
ANONYMOUS: "Menu item with cipher lock", RESEARCH DISCLOSURE, KENNETH MASON PUBLICATIONS, HAMPSHIRE, GB, vol. 321, no. 97, January 1991 (1991-01-01), XP007115984, ISSN: 0374-4353 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7073067B2 (en) * | 2003-05-07 | 2006-07-04 | Authernative, Inc. | Authentication system and method based upon random partial digitized path recognition |
JP2006243938A (en) * | 2005-03-01 | 2006-09-14 | Oki Electric Ind Co Ltd | Password input device |
JP4734965B2 (en) * | 2005-03-01 | 2011-07-27 | 沖電気工業株式会社 | PIN code input device |
US7849321B2 (en) | 2006-08-23 | 2010-12-07 | Authernative, Inc. | Authentication method of random partial digitized path recognition with a challenge built into the path |
WO2008124659A1 (en) * | 2007-04-05 | 2008-10-16 | Dynamic Representation Systems, Llc., Part Ii | Methods and systems for generating a symbol identification challenge |
WO2009000223A2 (en) * | 2007-06-27 | 2008-12-31 | Universität Tübingen | Device and method for tap-proof and manipulation-proof encoding of online accounts |
WO2009000223A3 (en) * | 2007-06-27 | 2009-10-01 | Universität Tübingen | Device and method for tap-proof and manipulation-proof encoding of online accounts |
FR2919742A1 (en) * | 2007-08-01 | 2009-02-06 | Phoum Lib | Transaction securing method for mobile terminal, involves relating transmitter with receiver, and loading connection to certify actions of user by generating ad hoc safety tests under form of non interpretable images by machine |
EP2514135A1 (en) * | 2009-12-14 | 2012-10-24 | Telcordia Technologies, Inc. | Systems and methods for authenticating a server by combining image recognition with codes |
EP2514135A4 (en) * | 2009-12-14 | 2015-02-18 | Telcordia Tech Inc | Systems and methods for authenticating a server by combining image recognition with codes |
EP2682891A1 (en) * | 2012-07-06 | 2014-01-08 | Samsung Electronics Co., Ltd | Electronic Device and Method for Releasing Lock Using Element Combining Color and Symbol |
CN103530051A (en) * | 2012-07-06 | 2014-01-22 | 三星电子株式会社 | Electronic device and method for releasing lock using element combining color and symbol |
US9477831B2 (en) | 2012-07-06 | 2016-10-25 | Samsung Electronics Co., Ltd. | Electronic device and method for releasing lock using element combining color and symbol |
Also Published As
Publication number | Publication date |
---|---|
JP2006520047A (en) | 2006-08-31 |
EP1604258A1 (en) | 2005-12-14 |
US20060098841A1 (en) | 2006-05-11 |
CN1759364A (en) | 2006-04-12 |
KR20050117552A (en) | 2005-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1472584B1 (en) | Secure data input dialogue using visual cryptography | |
US20060098841A1 (en) | Method and system for enabling remote message composition | |
US6209104B1 (en) | Secure data entry and visual authentication system and method | |
CN101601222B (en) | Online data encryption and decryption | |
US20050117748A1 (en) | Secure visual message communication method and device | |
US8150034B2 (en) | Method and system for transmitting data from a first data processing device to a second data processing device | |
GB2416058A (en) | Secure data communication between a client terminal and remote server | |
JP2008537210A (en) | Secured data communication method | |
EP1509879B1 (en) | Tamper-resistant visual encryption method and device | |
US20060026428A1 (en) | Key synchronization in an image cryptographic systems | |
US20060008086A1 (en) | Image encryption method and visual decryption device | |
US9811828B2 (en) | Method for authentication of mobile transactions using video encryption and method for video encryption | |
WO2015002610A1 (en) | Method and system for authenticating printed documents | |
EP3594838A1 (en) | Method for recovering a secret key securely stored in a secure element | |
WO2011052180A1 (en) | Encrypted message transmission device, program, encrypted message transmission method and authentication system | |
Divya et al. | Multi-Color Technique and Session Key Method to Prevent Shoulder Surfing Attacks in Secure Transactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004715983 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2006098841 Country of ref document: US Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10548251 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006506655 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020057016907 Country of ref document: KR Ref document number: 20048064440 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2004715983 Country of ref document: EP Ref document number: 1020057016907 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 10548251 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2004715983 Country of ref document: EP |